is this triangulation?
multiple kekasms
The tuning in started a few years ago when a group called Shadw Brkers tried to sell their hacked code into Cisco routers for $500K. There were no takers and would have to assume that being because most everyone in that biz already had the code (or even were its authors).
The group ended up posting it online somewhere for free, meaning every 12 year old computer geek has access to 80% of the world's routers.
digital recording of every phone call and email since 2002? Every cell text, pic, call since 2006?
Early in this decade, the storage companies were considered to be going the way of the dinosaurs and were blowing out their earnings expectations because of the demand.
The cloud's supposed endless capacity changed everything.
Anon posted a year ago that the last device made with no backdoor component was the Mac PowerPC G4 and/or G5 with MorphOS loaded.